Soumettre #768983: Tenda i3 V1.0.0.6(2204) Buffer Overflowinformation

TitreTenda i3 V1.0.0.6(2204) Buffer Overflow
DescriptionAffected component(s): httpd, formexeCommand, /goform/exeCommand, cmdinput Attack vector(s): Remote exploitation via crafted HTTP POST to /goform/exeCommand with an overly long cmdinput. Suggested description: Tenda i3 V1.0.0.6(2204) contains a stack-based buffer overflow in httpd due to insufficient length validation of the cmdinput parameter in formexeCommand. A remote attacker can send a crafted request to /goform/exeCommand to trigger a denial of service or potentially achieve code execution. Discoverer(s)/Credits: Svigo, Huazhong University of Science and Technology
La source⚠️ https://github.com/Svigo-o/Tenda_vul/tree/main/tenda-i3-formexeCommand-cmdinput-buffer-overflow
Utilisateur
 Svigo (UID 95964)
Soumission27/02/2026 09:18 (il y a 1 mois)
Modérer08/03/2026 13:39 (9 days later)
StatutAccepté
Entrée VulDB349769 [Tenda i3 1.0.0.6(2204) /goform/exeCommand formexeCommand cmdinput buffer overflow]
Points20

Interested in the pricing of exploits?

See the underground prices here!